pentesting 0.7.0 → 0.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (2) hide show
  1. package/dist/index.js +49 -49
  2. package/package.json +1 -1
package/dist/index.js CHANGED
@@ -1372,27 +1372,27 @@ async function executeToolCall(toolName, input) {
1372
1372
  let result;
1373
1373
  switch (toolName) {
1374
1374
  // system tool
1375
- case "bash":
1375
+ case TOOL_NAME.BASH:
1376
1376
  result = await executeBash(input.command, {
1377
1377
  timeout: input.timeout || 6e4,
1378
1378
  background: input.background
1379
1379
  });
1380
1380
  break;
1381
- case "read_file":
1381
+ case TOOL_NAME.READ_FILE:
1382
1382
  result = await readFile2(
1383
1383
  input.path,
1384
1384
  input.start_line,
1385
1385
  input.end_line
1386
1386
  );
1387
1387
  break;
1388
- case "write_file":
1388
+ case TOOL_NAME.WRITE_FILE:
1389
1389
  result = await writeFile2(
1390
1390
  input.path,
1391
1391
  input.content,
1392
1392
  input.overwrite
1393
1393
  );
1394
1394
  break;
1395
- case "list_directory":
1395
+ case TOOL_NAME.LIST_DIRECTORY:
1396
1396
  result = await listDirectory(
1397
1397
  input.path,
1398
1398
  input.recursive,
@@ -1400,147 +1400,147 @@ async function executeToolCall(toolName, input) {
1400
1400
  );
1401
1401
  break;
1402
1402
  // network scanning
1403
- case "rustscan":
1403
+ case TOOL_NAME.RUSTSCAN:
1404
1404
  result = await executeRustscan(input);
1405
1405
  break;
1406
- case "nmap_scan":
1406
+ case TOOL_NAME.NMAP_SCAN:
1407
1407
  result = await executeNmapScan(input);
1408
1408
  break;
1409
- case "tcpdump_capture":
1409
+ case TOOL_NAME.TCPDUMP_CAPTURE:
1410
1410
  result = await executeTcpdump(input);
1411
1411
  break;
1412
1412
  // Web Tools
1413
- case "web_request":
1413
+ case TOOL_NAME.WEB_REQUEST:
1414
1414
  result = await executeWebRequest(input);
1415
1415
  break;
1416
- case "directory_bruteforce":
1416
+ case TOOL_NAME.DIRECTORY_BRUTEFORCE:
1417
1417
  result = await executeDirBruteforce(input);
1418
1418
  break;
1419
- case "sql_injection":
1419
+ case TOOL_NAME.SQL_INJECTION:
1420
1420
  result = await executeSqlmap(input);
1421
1421
  break;
1422
- case "browser_automation":
1422
+ case TOOL_NAME.BROWSER_AUTOMATION:
1423
1423
  result = await executeBrowserAutomation(input);
1424
1424
  break;
1425
1425
  // Exploitation Tools
1426
- case "searchsploit":
1426
+ case TOOL_NAME.SEARCHSPLOIT:
1427
1427
  result = await executeSearchsploit(input);
1428
1428
  break;
1429
- case "metasploit":
1429
+ case TOOL_NAME.METASPLOIT:
1430
1430
  result = await executeMetasploit(input);
1431
1431
  break;
1432
- case "generate_payload":
1432
+ case TOOL_NAME.GENERATE_PAYLOAD:
1433
1433
  result = await generatePayload(input);
1434
1434
  break;
1435
1435
  // Credential Tools
1436
- case "bruteforce_login":
1436
+ case TOOL_NAME.BRUTEFORCE_LOGIN:
1437
1437
  result = await executeBruteforce(input);
1438
1438
  break;
1439
- case "crack_hash":
1439
+ case TOOL_NAME.CRACK_HASH:
1440
1440
  result = await executeCrackHash(input);
1441
1441
  break;
1442
1442
  // permission escalation
1443
- case "run_privesc_enum":
1443
+ case TOOL_NAME.RUN_PRIVESC_ENUM:
1444
1444
  result = await executePrivescEnum(input);
1445
1445
  break;
1446
- case "check_sudo":
1446
+ case TOOL_NAME.CHECK_SUDO:
1447
1447
  result = await checkSudo(input);
1448
1448
  break;
1449
- case "find_suid":
1449
+ case TOOL_NAME.FIND_SUID:
1450
1450
  result = await findSuid(input);
1451
1451
  break;
1452
1452
  // Post-Exploitation
1453
- case "setup_tunnel":
1453
+ case TOOL_NAME.SETUP_TUNNEL:
1454
1454
  result = await setupTunnel(input);
1455
1455
  break;
1456
- case "dump_credentials":
1456
+ case TOOL_NAME.DUMP_CREDENTIALS:
1457
1457
  result = await dumpCredentials(input);
1458
1458
  break;
1459
- case "lateral_movement":
1459
+ case TOOL_NAME.LATERAL_MOVEMENT:
1460
1460
  result = await executeLateralMovement(input);
1461
1461
  break;
1462
1462
  // Windows / SMB / AD Tools
1463
- case "netcat":
1463
+ case TOOL_NAME.NETCAT:
1464
1464
  result = await executeNetcat(input);
1465
1465
  break;
1466
- case "smb_enum":
1466
+ case TOOL_NAME.SMB_ENUM:
1467
1467
  result = await executeSmbEnum(input);
1468
1468
  break;
1469
- case "enum4linux":
1469
+ case TOOL_NAME.ENUM4LINUX:
1470
1470
  result = await executeEnum4linux(input);
1471
1471
  break;
1472
- case "crackmapexec":
1472
+ case TOOL_NAME.CRACKMAPEXEC:
1473
1473
  result = await executeCrackmapexec(input);
1474
1474
  break;
1475
- case "smbclient":
1475
+ case TOOL_NAME.SMBCLIENT:
1476
1476
  result = await executeSmbclient(input);
1477
1477
  break;
1478
- case "rpcclient":
1478
+ case TOOL_NAME.RPCCLIENT:
1479
1479
  result = await executeRpcclient(input);
1480
1480
  break;
1481
- case "winrm":
1481
+ case TOOL_NAME.WINRM:
1482
1482
  result = await executeWinrm(input);
1483
1483
  break;
1484
- case "rdp_check":
1484
+ case TOOL_NAME.RDP_CHECK:
1485
1485
  result = await executeRdpCheck(input);
1486
1486
  break;
1487
- case "ldap_search":
1487
+ case TOOL_NAME.LDAP_SEARCH:
1488
1488
  result = await executeLdapSearch(input);
1489
1489
  break;
1490
- case "kerbrute":
1490
+ case TOOL_NAME.KERBRUTE:
1491
1491
  result = await executeKerbrute(input);
1492
1492
  break;
1493
- case "bloodhound":
1493
+ case TOOL_NAME.BLOODHOUND:
1494
1494
  result = await executeBloodhound(input);
1495
1495
  break;
1496
- case "mssql_client":
1496
+ case TOOL_NAME.MSSQL_CLIENT:
1497
1497
  result = await executeMssqlClient(input);
1498
1498
  break;
1499
- case "mysql_client":
1499
+ case TOOL_NAME.MYSQL_CLIENT:
1500
1500
  result = await executeMysqlClient(input);
1501
1501
  break;
1502
- case "reverse_shell":
1502
+ case TOOL_NAME.REVERSE_SHELL:
1503
1503
  result = await executeReverseShell(input);
1504
1504
  break;
1505
1505
  // Service Enumeration Tools
1506
- case "zone_transfer":
1506
+ case TOOL_NAME.ZONE_TRANSFER:
1507
1507
  result = await executeZoneTransfer(input);
1508
1508
  break;
1509
- case "snmp_walk":
1509
+ case TOOL_NAME.SNMP_WALK:
1510
1510
  result = await executeSnmpWalk(input);
1511
1511
  break;
1512
- case "snmp_check":
1512
+ case TOOL_NAME.SNMP_CHECK:
1513
1513
  result = await executeSnmpCheck(input);
1514
1514
  break;
1515
- case "onesixtyone":
1515
+ case TOOL_NAME.ONESIXTYONE:
1516
1516
  result = await executeOnesixtyone(input);
1517
1517
  break;
1518
- case "ftp_enum":
1518
+ case TOOL_NAME.FTP_ENUM:
1519
1519
  result = await executeFtpEnum(input);
1520
1520
  break;
1521
- case "ftp_anon":
1521
+ case TOOL_NAME.FTP_ANON:
1522
1522
  result = await executeFtpAnon(input);
1523
1523
  break;
1524
- case "nbtscan":
1524
+ case TOOL_NAME.NBTSCAN:
1525
1525
  result = await executeNbtscan(input);
1526
1526
  break;
1527
- case "rpc_info":
1527
+ case TOOL_NAME.RPC_INFO:
1528
1528
  result = await executeRpcInfo(input);
1529
1529
  break;
1530
- case "showmount":
1530
+ case TOOL_NAME.SHOWMOUNT:
1531
1531
  result = await executeShowmount(input);
1532
1532
  break;
1533
- case "telnet":
1533
+ case TOOL_NAME.TELNET:
1534
1534
  result = await executeTelnet(input);
1535
1535
  break;
1536
- case "hydra":
1536
+ case TOOL_NAME.HYDRA:
1537
1537
  result = await executeHydra(input);
1538
1538
  break;
1539
1539
  // report
1540
- case "report_finding":
1540
+ case TOOL_NAME.REPORT_FINDING:
1541
1541
  result = await reportFinding(input);
1542
1542
  break;
1543
- case "take_screenshot":
1543
+ case TOOL_NAME.TAKE_SCREENSHOT:
1544
1544
  result = await takeScreenshot(input);
1545
1545
  break;
1546
1546
  default:
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "pentesting",
3
- "version": "0.7.0",
3
+ "version": "0.7.1",
4
4
  "description": "Autonomous Penetration Testing AI Agent",
5
5
  "type": "module",
6
6
  "main": "dist/index.js",